Skip to main content

Bug Assignee Prediction Using Association Rule Mining

  • Conference paper
  • First Online:
Computational Science and Its Applications -- ICCSA 2015 (ICCSA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9158))

Included in the following conference series:

Abstract

In open source software development we have bug repository to which both developers and users can report bugs. Bug triage, deciding what to do with an incoming bug report, takes a large amount of developer resources and time. All newly coming bug reports must be triaged to determine whether the report is correct and requires attention and if it is, which potentially experienced developer/fixer will be assigned the responsibility of resolving the bug report. In this paper, we propose to apply association mining to assist in bug triage by using Apriori algorithm to predict the developer that should work on the bug based on the bug’s severity, priority and summary terms. We demonstrate our approach on collection of 1,695 bug reports of Thunderbird, AddOnSDK and Bugzilla products of Mozilla open source project. We have analyzed the association rules for top five assignee of the three products. Association rules can support the managers to improve its process during development and save time and resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE Int. Conf. Software Maintenance, pp. 346–355 (2008)

    Google Scholar 

  2. Lamkanfi, A., Demeyer, S., Giger, E., Goethals, B.: Predicting the severity of a reported bug. In: Mining Software Repositories, MSR, pp. 1–10 (2010)

    Google Scholar 

  3. Lamkanfi, A., Demeyer, S., Soetens, Q.D., Verdonck, T.: Comparing mining algorithms for predicting the severity of a reported bug. In: CSMR, pp. 249–258 (2011)

    Google Scholar 

  4. Chaturvedi, K.K., Singh, V.B.: Determining bug severity using machine learning techniques. In: CSI-IEEE Int. Conf. Software Engineering (CONSEG), pp. 378–387 (2012)

    Google Scholar 

  5. Chaturvedi, K.K., Singh, V.B.: An empirical Comparison of Machine Learning Techniques in Predicting the Bug Severity of Open and Close Source Projects. Int. J. Open Source Software and Processes 4(2), 32–59 (2013)

    Article  Google Scholar 

  6. Sharma, M., Bedi, P., Chaturvedi, K.K., Singh, V. B.: Predicting the priority of a reported bug using machine learning techniques and cross project validation. In: IEEE Int. Conf. Intelligent Systems Design and Applications (ISDA), pp. 27–29 (2012)

    Google Scholar 

  7. Cubranic, D., Murphy G.C.: Automatic bug triage using text categorization. In: Intl. Conf. Software Engineering. Citeseer, pp. 92–97 (2004)

    Google Scholar 

  8. Sharma, M., Kumari, M., Singh, V.B.: Understanding the meaning of bug attributes and prediction models. In: I-CARE 5th IBM Collaborative Academia Research Exchange Workshop, Article No. 15. ACM (2013)

    Google Scholar 

  9. Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: SIGMOD Conf. Management of Data. ACM, May 1993

    Google Scholar 

  10. Song, Q., Shepperd, M., Cartwright, M., Mair, C.: Software defect association mining and defect correction effort prediction. IEEE Transactions on Software Engineering 32(2), 69–82 (2006)

    Article  Google Scholar 

  11. Ali, K., Manganaris, S., Srikant, R.: Partial classification using association rules. In: Int. Conf. Knowledge Discovery and Data Mining, pp. 115–118 (1997)

    Google Scholar 

  12. Dong, G., Zhang, X., Wong, L., Li, J.: CAEP: classification by aggregating emerging patterns. In: Arikawa, S., Nakata, I. (eds.) DS 1999. LNCS (LNAI), vol. 1721, pp. 30–42. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  13. Liu, B., Hsu, W., Ma, Y.: Integrating classification and association rule mining. In: Int. Conf. Knowledge Discovery and Data Mining, pp. 80–86 (1998)

    Google Scholar 

  14. She, R., Chen, F., Wang, K., Ester, M., Gardy, J.L., Brinkman, F.L.: Frequent-subsequence-based prediction of outer membrane proteins. In: ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (2003)

    Google Scholar 

  15. Wang, K., Zhou, S.Q., Liew, S.C.: Building hierarchical classifiers using class proximity. In: Int. Conf. Very Large Data Bases, pp. 363–374 (1999)

    Google Scholar 

  16. Wang, K., Zhou, S., He, Y.: Growing decision tree on support-less association rules. In: Int. Conf. Knowledge Discovery and Data Mining (2000)

    Google Scholar 

  17. Yang, Q., Zhang, H.H., Li, T.: Mining web logs for prediction models in WWW caching and prefetching. In: ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (2001)

    Google Scholar 

  18. Yin, X., Han, J.: CPAR: classification based on predictive association rules. In: SIAM Int. Conf. Data Mining (2003)

    Google Scholar 

  19. Ying, A.T.T., Murphy, C.G., Ng, R., Chu-Carroll, M.C.: Predicting source code changes by mining revision history. In: Int. Workshop Mining Software Repositories (2004)

    Google Scholar 

  20. Zimmermann, T., Weigerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Int. Conf. Software Engineering (2004)

    Google Scholar 

  21. Mierswa, I., Wurst, M., Klinkenberg, R., Scholz, M., Euler, T.: YALE: rapid prototyping for complex data mining tasks. In: ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD 2006) (2006). http://www.rapid-i.com

  22. Porter, M.: An algorithm for suffix stripping. Program. 14(3), 130–137 (2008)

    Article  Google Scholar 

  23. www.mathworks.in/…/3016-armada-data-mining-tool-version-1-4

  24. Anvik, J., Hiew, L., Murphy, G.C.: Who should fix this bug? In: Int. Conf. Software Engineering (ICSE) (2006)

    Google Scholar 

  25. Amir, H.M., Neumann, G.: Assisting bug triage in large open source projects using approximate string matching. In: Int. Conf. Software Engineering Advances (ICSEA 2012), Lisbon, Portugal (2012)

    Google Scholar 

  26. Canfora, G., Cerulo, L.: How software repositories can help in resolving a new change request. In: Workshop on Empirical Studies in Reverse Engineering (2005)

    Google Scholar 

  27. Servant, F., Jones, J.A.: Whose fault: automatic developer-to-fault assignment through fault localization. In: Int. Conf. Software Engineering (ICSE 2012), pp. 36–46. IEEE Press, Piscataway (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. B. Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sharma, M., Kumari, M., Singh, V.B. (2015). Bug Assignee Prediction Using Association Rule Mining. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9158. Springer, Cham. https://doi.org/10.1007/978-3-319-21410-8_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21410-8_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21409-2

  • Online ISBN: 978-3-319-21410-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics